|
BugTraq
VMWare poor guest isolation design Aug 23 2007 03:22AM M. Burnett (mb xato net) (2 replies) Re: VMWare poor guest isolation design Aug 23 2007 04:49PM Arthur Corliss (corliss digitalmages com) (6 replies) Re: VMWare poor guest isolation design Aug 24 2007 01:06AM Jonathan Yu (jonathan i yu gmail com) (1 replies) Re: VMWare poor guest isolation design Aug 24 2007 08:13AM Arthur Corliss (corliss digitalmages com) (2 replies) More on VMWare poor guest isolation design Aug 25 2007 01:29AM M. Burnett (mb xato net) (2 replies) Re: More on VMWare poor guest isolation design Aug 27 2007 02:37PM wietse porcupine org (Wietse Venema) Re: More on VMWare poor guest isolation design Aug 25 2007 07:05PM Tim Newsham (newsham lava net) (1 replies) RE: More on VMWare poor guest isolation design Aug 27 2007 05:51PM M. Burnett (mb xato net) (2 replies) RE: More on VMWare poor guest isolation design Aug 28 2007 06:49AM Arthur Corliss (corliss digitalmages com) RE: VMWare poor guest isolation design Aug 23 2007 10:40PM James C. Slora Jr. (james slora phra com) RE: VMWare poor guest isolation design Aug 23 2007 08:46PM William Holmberg (wholmberg amdpi com) (1 replies) RE: VMWare poor guest isolation design Aug 24 2007 07:16AM Arthur Corliss (corliss digitalmages com) |
|
Privacy Statement |
that this isn't an issue if reasonable security practices are employed. On
the other hand, most security issues reported here wouldn't be issues if
reasonable security practices were employed. I have been saying that for
years.
Because it does not apply to your particular environment doesn't invalidate
the issue. There are many, many situations where someone would want to
access a vmware guest via the console and not allow any network access at
all. One that comes to mind is an offline root CA that you can only fire up
only when you need it--a virtual offline machine. Another situation for
myself is I keep all my hacking/pen-testing tools on a vm that I can use
when I need them, and quickly move to any vm host I need to run them on. I
don't necessarily want to make that virtual machine accessible from the
network. Anyway, it is absurd to say you will never log in to the console,
sometimes you just have to.
Whether it affects you personally or not, it certainly is helpful to know
that the capability exists so you can make better informed security
decisions--and that there is an undocumented switch to disable that feature.
Addressing some other points:
> If the host OS (or an account within it) is compromised,
> of course all bets are off when it comes to a virtual machine running
> within it.
This isn't completely true. Yes, it is much more difficult to secure a
virtual machine that way, but it can be done. You could, for example, use
full disk encryption to prevent someone from mounting a virtual disk outside
the guest OS. Besides, I concede that point in my article, emphasizing that
an automated attack increases the seriousness of the problem.
> Furthermore, this attack only works if you are running the vmware guest
> utilities *and* you are currently logged into a GUI desktop running the
> vmware userland process.
VMWare constantly reminds you that you don't have the vmware guest tools
installed. I'd say that most people do install them. But that doesn't matter
anyway because you can just use the VIX API function VixVM_InstallTools to
install them if they aren't already there.
And you do not need to be logged in, the VIX API allows you to wait until
the command actually runs. So it can just sit there until the next time you
do login to the console.
Mark Burnett
http://xato.net
> -----Original Message-----
> From: Arthur Corliss [mailto:corliss (at) digitalmages (dot) com [email concealed]]
> Sent: Thursday, August 23, 2007 10:49 AM
> To: M. Burnett
> Cc: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Re: VMWare poor guest isolation design
>
> On Wed, 22 Aug 2007, M. Burnett wrote:
>
> > I have run across a design issue in VMware's scripting automation API
> that
> > diminishes VM guest/host isolation in such a manner to facilitate
> privilege
> > escalation, spreading of malware, and compromise of guest operating
> systems.
> >
> > VMware's scripting API allows a malicious script on the host machine
> to
> > execute programs, open URLs, and perform other privileged operations
> on any
> > guest operating system open at the console, without requiring any
> > credentials on the guest operating system. Furthermore, the script
> can
> > execute programs even if you lock the desktop of the guest OS.
> >
> > For example, if a non-admin user is logged in at the vm host, but
> logged in
> > to guest operating systems as an administrator, the script running as
> a
> > non-admin on the host can still execute admin-level scripts on the
> guests.
> >
> > I obviously did not discover this issue--the API developers provided
> it as a
> > feature-I am simply pointing out the potential danger, that it was a
> poor
> > design decision, and that there is a need to establish best practices
> for
> > virtual machine guest and host isolation.
>
> I don't see this as a serious problem. This is the virtual equivalent
> of no
> physical security. If the host OS (or an account within it) is
> compromised,
> of course all bets are off when it comes to a virtual machine running
> within
> it.
>
> Furthermore, this attack only works if you are running the vmware guest
> utilities *and* you are currently logged into a GUI desktop running the
> vmware userland process.
>
> I personally look at this as an issue for Windows. I personally don't
> install the vmware guest software for my Linux VMs, nor would I log
> into a
> GUI as root. For that matter, if you are merely hosting the guest VMs
> why
> would you need to ever use the vmware console after installation? Use
> a
> network-based access method, making the need for the vmware guest
> utilities
> unnecessary. That should be sufficient for all OS'es.
>
> In (not so) short, this attack vector is virtually worthless if
> reasonable
> security practices are employed.
>
> --Arthur Corliss
> Live Free or Die
0? *?H?÷
?0?10 +0? *?H?÷
? 0?0? cß¡VDzò}ée¾{*×?&0
*?H?÷
0b10 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CA0
070509163711Z
080508163711Z0=10UThawte Freemail Member10 *?H?÷
mb (at) xato (dot) net0 [email concealed]?0
*?H?÷
0?ª%!{;ëÓÈ<0??~C8É?õÔ_?ÆS_¹ñlµ?å·Èøä2xÉfº=hTV11 hY:Ü?n
jzÒç?~\¼ÅÍzZ9VÖ?Øçê'qÆò´æ½¡cq??
ÝO !m?DhVÑe?OòN8¡å?#¡?Ê {cE?£y0w0Uÿ?0 `?H?øB 0,+e#0!0083zwvGTz6p7wGjCksTJZA0U0
mb (at) xato (dot) net0 [email concealed]Uÿ00
*?H?÷
2ú¯÷$?52È?ÄH6/øÀ@A-|?¥æ ¾?YýÊu?¼ÂÛÅy?Íu5Ù©,ùM[?Ü×-?Û)S¼l¾?zá6;ô7ÐT·9?Þ»¡ty¯²½/i~_
í§Å-í [YZP÷|ª??¼=üsh??pÛv0?-0?? 0
*?H?÷
0Ñ10 UZA10UWestern Cape10U Cape Town10U
Thawte Consulting1(0&UCertification Services Division1$0"UThawte Personal Freemail CA1+0) *?H?÷
personal-freemail (at) thawte (dot) com0 [email concealed]
960101000000Z
201231235959Z0Ñ10 UZA10UWestern Cape10U Cape Town10U
Thawte Consulting1(0&UCertification Services Division1$0"UThawte Personal Freemail CA1+0) *?H?÷
personal-freemail (at) thawte (dot) com0 [email concealed]?0
*?H?÷
0?Ôi×Ô°?d[qéGØQ¶êr?°?^}-
{ß?%u(t:B,c'??{Kï~??ê£Ý¹Î?dÂnD¬|æèMq@8¦£?xöù??^êÀ^vëÙ£]nz|¥KU)??&Õj»8$j?DZڣ??ýyÛåZĹ£00Uÿ0ÿ0
*?H?÷
Çì?~Nøõ?¥gb*¤ðM`Ðo`Xa¬&»R5\Ï0û¨J??bB#?ôºd?¬G)ß?^Òl`q\¢¬Üy
ãçnGµ
(èä?ýô¦Ù|±øÜ_#& ??sÐÞC©?%òæ?/Êþ¦«?u?ÝQ?käøÑÎw¢0??0?¨
0
*?H?÷
0Ñ10 UZA10UWestern Cape10U Cape Town10U
Thawte Consulting1(0&UCertification Services Division1$0"UThawte Personal Freemail CA1+0) *?H?÷
personal-freemail (at) thawte (dot) com0 [email concealed]
030717000000Z
130716235959Z0b10 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CA0?0
*?H?÷
0?Ħ<UsUûN¹Ê?ZhÀupßéÿ£ì½Íõ[òv½:aò¿QÎÔåP
0×cZ,?p?ÝÉð+?Zª?qV˯<çñ?6$*Ï+Õó?w=¾+þ»>¿@?d×§¦»?eÑÅ*T?H§¶Ñ<
a@dr`·û£?0?0Uÿ0ÿ0CU<0:08 6 4?2http://crl.tha
wte.com/ThawtePersonalFreemailCA.crl0U0)U"0 ¤010UPrivateLabel2-1380
*?H?÷
H?ÑP?ê.Ì
£f¬g¯¬¾Â¡C??L!¸ø6ª-?6/ÀôP ?p<ýáabÃÙ:~?±?Å?t?%P?bÇÛ'qW%Ý©?9?? Oe_?Ú÷÷?ÖÆN®öê4å[5MwãV!x?Ü!5Þ$±ÓFÿ]_eO1?¢0??0v0b10 UZA1%0#U
Thawte Consulting (Pty) Ltd.1,0*U#Thawte Personal Freemail Issuing CAcß¡VDzò}ée¾{*×?&0 + ?0 *?H?÷
1 *?H?÷
0 *?H?÷
1
070823203048Z0# *?H?÷
1ù¢J"ÓTl_?Hé6Æôó^0$ *?H?÷
100+0
*?H?÷
0
*?H?÷
??
?v^9÷Ã?Ì?Ø,?{ÊÅ%¸}?© Wz?f±ÿJ?w?Õˬmïz?ÁÊ?ãªl5Id?
Ó+?a1A?(lµ7¦ió?Ë?QF?ä.t?Xw2î»$£¦
B©«Xé
4C?¥?¸¤¥dP¶¡¨?Tà§f@WÝ
[ reply ]